Authentication Of User Computers

  • Published: Feb 23, 2017
  • Earliest Priority: Apr 21 2015
  • Family: 7
  • Cited Works: 0
  • Cited by: 0
  • Cites: 2
  • Additional Info: Full text
Abstract

An approach for authenticating a user computer, connectable to a mobile network includes a computing device retrieving an attribute credential, the attribute credential certifying a set of user attributes, a device identifier for identifying the user computer to the mobile network, a location credential, the location credential certifying a device identifier and location data indicating a location of the user computer determined by the mobile network. The approach includes a computer producing an authentication token comprising the attribute credential, the location credential, the location data and a proof for proving that the device identifier in the attribute credential equals the device identifier in the location credential. The approach includes a computer producing a blinded attribute credential by randomized blinding of the attribute credential, wherein the authentication token includes the blinded attribute credential and the proof verifies possession by the user computer of the attribute credential in the blinded attribute credential.


Claims
Applicants
Download PDF
Document Preview
Document History
  • Publication: Feb 23, 2017
  • Application: Nov 8, 2016
    US US 201615345929 A
  • Priority: Nov 8, 2016
    US US 201615345929 A
  • Priority: Apr 21, 2015
    US US 201514692441 A

Download Citation


Sign in to the Lens

Feedback